Japan s activities for security and safety of IoT systems

Size: px
Start display at page:

Download "Japan s activities for security and safety of IoT systems"

Transcription

1 Japan s activities for security and safety of IoT systems March 20, 2017 Takashi Wada Vice President, Software Reliability Enhancement Center (SEC) Information-Technology Promotion Agency (IPA), Japan Frei verwendbar

2 What is IPA? IPA: Information-technology Promotion Agency, Japan Established in 1970 by the Act on Facilitation of Information Processing, and reorganized in 2004 as an Independent Administrative Agency Working with Ministry of Economy, Trade and Industry (METI) Three Missions: Aiming to realize a Dependable IT society 2

3 IoT Security Guidelines in Japan Japanese government and IoT Accerelation Consortium formulated the IoT security guidelines in July IoT security guidelines consist of 5 major principles corresponding to 5 phases (policy setting, analyze, design, connect, operate & maintain) in IoT lifecycle Before this, IPA formulated developers guidelines to promote safe and secure IoT products and services. Most content of IPA guidelines were incorporated into the government s guidelines. 3

4 Operation Maintenance Design Analysis Policy IPA s Development guideline contents 17 guidelines which CEO, management, developers and operators should consider CEO Management Operators Developers Major item G/L# Guidelines Making corporate 1 Formulating the basic policies for Security/Safety efforts for the 2 Reviewing systems and human resources for Security/Safety Security/Safety of the Smart-society 3 Preparing for internal frauds and mistakes 4 Identifying the objects to be protected Understanding the 5 Assuming the risks caused by connections risks of the Smartsociety 6 Assuming the risks spread through connections 7 Understanding physical security risks Considering the designs to protect the objects to be protected 8 Designing to enable both individual and total protection 9 Designing so as not to cause trouble in other connected entities 10 Ensuring consistency between the designs of safety and security 11 Designing to ensure Security/Safety even when connected to unspecified entities 12 Verifying/validating the designs of safety and security Considering the designs to ensure protection even after market release 13 Implementing the functions to identify and record own status 14 Implementing the functions to maintain Security/Safety even after the passage of time Operators Protecting with relevant parties 15 Identifying IoT risks and providing information after market release 16 Informing relevant business operators of the procedures to be followed after market release 17 Making the risks caused by connections known to general users 4

5 Security and Safety both matter Both origins come from same Ancient Latin Secrus (safety) Security Protection of information property from hazard (outside attack) Safety Protection of life and tangible assets from hazard (inside failure) Safety regulation is largely in place (automobile, railway, control system ) but security regulation is not (for IoT!) Users hazard attacks security safety 5 5

6 Action for Global Safe & Secure IoT System International Standardization of Security/Safety requirement for IoT Framework Possible Work Item Coordinate priority and concept for possible international standard Level Japan Germany Requirement, Vocabulary, Recommended Action IoT Security Guidelines Industrie 4.0 Security Guidelines Architecture, Specification Technical Reference of the Guidelines RAMI 4.0? Work Together for Safe and Secure IoT Systems 6

Japan s Common Vocabulary Policy. Takashi Wada Ministry of Economy, Trade and Industry May 2015

Japan s Common Vocabulary Policy. Takashi Wada Ministry of Economy, Trade and Industry May 2015 Japan s Common Vocabulary Policy Takashi Wada Ministry of Economy, Trade and Industry May 2015 WHY 1 Fragmentation of Japan s government IT system 26 thousand Administrative procedures 42.8% FTTH user

More information

Hannover Declaration

Hannover Declaration Hannover Declaration On 28 April 2016, the Ministry of Economy, Trade and Industry (METI) of Japan and the Federal Ministry for Economic Affairs and Energy (BMWi) of the Federal Republic of Germany released

More information

MEMORANDUM OF COOPERATION BETWEEN THE INDUSTRIAL AND PRODUCT SAFETY POLICY GROUP OF THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND

MEMORANDUM OF COOPERATION BETWEEN THE INDUSTRIAL AND PRODUCT SAFETY POLICY GROUP OF THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND MEMORANDUM OF COOPERATION BETWEEN THE INDUSTRIAL AND PRODUCT SAFETY POLICY GROUP OF THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND THE DEPARTMENT OF INDUSTRIAL WORKS and THE DEPARTMENT OF INDUSTRIAL

More information

Disaster Management and Security Solutions to Usher in the IoT Era

Disaster Management and Security Solutions to Usher in the IoT Era Disaster Management and Solutions for a Safe and Secure Way of Life Overview Disaster Management and Solutions to Usher in the IoT Era Takeshi Miyao Toshihiko Nakano, Ph.D. 1. The Bright and Dark Sides

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) -

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) - Reporting Status of Vulnerability- Information about Software Products and Websites - 1 st Quarter of 212 (January March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites

Reporting Status of Vulnerability-related Information about Software Products and Websites Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 218 (July - September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan October 1, 2009 Hideaki Kobayashi *1, Kenji Watanabe *2, Takahito Watanabe *1,

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) -

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) - Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 215 (July September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

Information Security and Cyber Security

Information Security and Cyber Security Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information

More information

Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan

Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan Masaki Kubo, Takayuki Uchiyama JPCERT Coordination Center Vulnerability Coordination Group Agenda

More information

Industrial ICT Solutions Company Business Strategy

Industrial ICT Solutions Company Business Strategy Industrial ICT Company Business Strategy Hironobu Nishikori Company President and CEO Industrial ICT Company Representative Executive Officer Corporate Senior Vice President Toshiba Corporation July 6,

More information

Strategy for information security in Sweden

Strategy for information security in Sweden Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

2010/TELMIN/011 Benefiting Socio-Economic Activities Through the Application of ICT

2010/TELMIN/011 Benefiting Socio-Economic Activities Through the Application of ICT 2010/TELMIN/011 Benefiting Socio-Economic Activities Through the Application of ICT Submitted by: Japan 8 th Ministerial Meeting on Telecommunications and Information Industry Okinawa, Japan 30-31 October

More information

New Partners Join Charter of Trust to Protect Critical Infrastructure

New Partners Join Charter of Trust to Protect Critical Infrastructure Siemens, The AES Corporation, Airbus, Allianz, Atos, Enel, Daimler Press Houston, March 8, 2018 New Partners Join Charter of Trust to Protect Critical Infrastructure The AES Corporation, Atos and Enel

More information

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business

More information

ISA Security Compliance Institute

ISA Security Compliance Institute ISA Security Compliance Institute ISASecure from an Asset Owner s perspective ISA Automation Week 2013 1 ISA Security Compliance Institute Presentation objectives Introduction to ISA/IEC 62443 Standards

More information

The Cyber/Physical Security Framework (Draft) Cyber Security Division Commerce and Information Policy Bureau Ministry of Economy, Trade and Industry

The Cyber/Physical Security Framework (Draft) Cyber Security Division Commerce and Information Policy Bureau Ministry of Economy, Trade and Industry The Cyber/Physical Security Framework (Draft) Cyber Security Division Commerce and Information Policy Bureau Ministry of Economy, Trade and Industry Table of contents Preface Settling on the Cyber/Physical

More information

Security Solutions Assisting Social Infrastructure Digitalization

Security Solutions Assisting Social Infrastructure Digitalization FEATURED ARTICLES Social Infrastructure and its Digitalization Overview Solutions Assisting Social Infrastructure Digitalization Takeshi Miyao Junichi Tanimoto 1. Digitalization and Threats The rise of

More information

Signed on December 22 nd, 2015 MINISTRY OF INDUSTRY MINISTRY OF ECONOMY, TRADE AND INDUSTRY

Signed on December 22 nd, 2015 MINISTRY OF INDUSTRY MINISTRY OF ECONOMY, TRADE AND INDUSTRY MEMORANDUM OF COOPERATION BETWEEN THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND THE DEPARTMENT OF INDUSTRIAL WORKS, MINISTRY OF INDUSTRY OF THAILAND ON STRENGTHENING THE RISK-BASED CHEMICAL

More information

Cybersecurity Risk Management:

Cybersecurity Risk Management: Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of

More information

NIS-Directive and Smart Grids

NIS-Directive and Smart Grids NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements

More information

Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures)

Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures) Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures) Ichiro Murase Team Leader of Security Technology Team, Information Technology

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

IT Security Evaluation and Certification Scheme Document

IT Security Evaluation and Certification Scheme Document IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents

More information

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers 302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Cyber Security Measures in Automated Driving Systems. March 30, 2018 Panel on Business Strategies for Automated Driving

Cyber Security Measures in Automated Driving Systems. March 30, 2018 Panel on Business Strategies for Automated Driving Cyber Security Measures in Automated Driving Systems March 30, 2018 Panel on Business Strategies for Automated Driving 0. Introduction (1/2) External Communication Risks of Automated Driving Systems For

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam.

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam. [NEC Group Internal Use Only] IoT Security - Challenges & Standardization status Sivabalan Arumugam Outline IoT Security Overview IoT Security Challenges IoT related Threats

More information

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat ASEAN COOPERATION ON DISASTER MANAGEMENT Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat AADMER - FOR A MORE UNITED AND COORDINATED RESPONSE TOWARD DISASTERS WITHIN THE REGION

More information

International Policy Division, Global Strategy Bureau

International Policy Division, Global Strategy Bureau MIC International Policy Division, Global Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this publication,

More information

Financial Results for the Three Months Ended June 30, August 7, 2018

Financial Results for the Three Months Ended June 30, August 7, 2018 Financial Results for the Three Months Ended June 30, 2018 August 7, 2018 Copyright 2018 NIPPON TELEGRAPH AND TELEPHONE CORPORATION 1 This document is a translation of the Japanese original. The Japanese

More information

Information Technology Engineers Examination. Database Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Information Technology Engineers Examination. Database Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for Information Technology Engineers Examination Database Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 3.1

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems

Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems Hitachi Review Vol. 65 (2016), No. 1 729 Featured Articles Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems Kazuki

More information

The Information Security Management Benchmark (abbr: ISM-Benchmark)

The Information Security Management Benchmark (abbr: ISM-Benchmark) The Information Security Management Benchmark (abbr: ISM-Benchmark) July 17, 2008 Yasuko Kanno Chief Advisor, IPA Security Center Information-technology Promotion Agency, Japan (IPA) http://www.ipa.go.jp/security/

More information

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master

More information

International Policy Division, Global ICT Strategy Bureau

International Policy Division, Global ICT Strategy Bureau MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Vulnerability-centric assurance activities for MFP PP as a candidate for cpp

Vulnerability-centric assurance activities for MFP PP as a candidate for cpp Vulnerability-centric assurance activities for MFP PP as a candidate for cpp Fumiaki Manabe JISEC / IPA, Japan September 11, 2013 1 Agenda The security surrounding the MFP PP development for Government

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber

More information

Summary of the Cybersecurity Policy for CIP (4th Edition)

Summary of the Cybersecurity Policy for CIP (4th Edition) Summary of the Cybersecurity Policy for CIP (4th Edition) April 18, 2017 Published July 25, 2018 Revised 1 Purpose of the Cybersecurity Policy for CIP (4 th Edition) ( this Cybersecurity Policy ) Promotion

More information

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship

More information

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Standardization Bureau (TSB) Consultant Moscow, 9-11 november 2011 Contents The benefits of conformity assessment Conformity

More information

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and

More information

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security Romania - Cyber Security Strategy 6th IT STAR Workshop on Digital Security 30 March 2012 Bratislava, Slovakia Florin VREJOIU Horia GLIGOR Programme Manager Member of the Board Association for Information

More information

Open your sustainable future with JASE-World.

Open your sustainable future with JASE-World. Open your sustainable future with JASE-World. Chairman: Sadayuki Sakakibara, Chairman of the Japan Business Federation (Nippon Keidanren) Founded: October, 2008 Corporate members: 48 Association members:

More information

NTT Group s Commitment to Smart World. IoT Enables a Smart World

NTT Group s Commitment to Smart World. IoT Enables a Smart World NTT Group s Commitment to Smart World IoT Enables a Smart World 2 Las Vegas Public safety solution Creation of new values by Connected Ship Forecasting the people flow and optimizing the control method

More information

Promoting Quality Infrastructure Investment

Promoting Quality Infrastructure Investment Promoting Quality Infrastructure Investment - Japan s contribution to infrastructure development - Mitsutoshi Kajikawa Director, Development Policy Division Ministry of Finance, Japan 1 Quality Infrastructure

More information

Sustainability Report 2009

Sustainability Report 2009 Sustainability Report 2009 Contents Group Profile 6 Hitachi Chemical Group s Business Operations and CSR 9 To All Stakeholders 11 Report on Violation of the Antimonopoly Act Regarding Sale of Cross-linked

More information

Regional TSM&O Vision and ITS Architecture Update

Regional TSM&O Vision and ITS Architecture Update Regional TSM&O Vision and ITS Architecture Update Progress Update Transportation Coordinating Committee April 5, 2019 Task List (2018 2020) 1. Develop a Regional TSM&O Vision 2. Document Current TSM&O

More information

Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions. Cyber Attack: A Global Phenomenon

Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions. Cyber Attack: A Global Phenomenon Investor Presentation CAT, INC. Ground Breaking Cyber Security Solutions Cyber Attack: A Global Phenomenon CAT, INC Summary: Cyber Advanced Technology, Inc. R & D Lab Offering 7-10 Year Next Generation

More information

IPv6 Deployment Overview & Policy Update

IPv6 Deployment Overview & Policy Update IPv6 Deployment Overview & Policy Update Takuya MIYOSHI Internet Policy Office Ministry of Internal Affairs and Communications, Japan 24 th February, 2005 History and Acceleration of Japan s IT Strategy

More information

Customs in the 21st Century

Customs in the 21st Century 2009/SCCP/SWWG/WKSP4/006 Customs in the 21st Century Submitted by: WCO Single Window Working Group Capacity Building Workshop 4 Singapore 6-8 April 2009 Customs in the 21 st Century Coordinated Border

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY MEMORANDUM OF UNDERSTANDING between the MINISTERIO DE ELECTRICIDAD Y ENERGIA RENOVABLE DEL ECUADOR and the INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY This Memorandum of Understanding

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Welcome to Korea Accreditation System

Welcome to Korea Accreditation System Welcome to Korea Accreditation System Korean Agency for Technology and Standards 1 2 3 4 5 Organization of Government President Prime Minister Education, Science & Technology Unification National Defense

More information

Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow

Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow NIST and the Government Role in the U.S. Standards System Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow 1 Discussion Outline NIST Overview Government Role National Technology

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

The UNISDR Private Sector Alliance for Disaster Resilient Societies

The UNISDR Private Sector Alliance for Disaster Resilient Societies The UNISDR Private Sector Alliance for Disaster Resilient Societies Sandra Amlang United Nations Office for Disaster Risk Reduction (UNISDR) Regional Office- the Americas. 24 August 2017 Increase in Frequency

More information

STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE

STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE PLAN STRUCTURE I INTRODUCTION Background History of the Project

More information

Peer Review on Energy Efficiency in Viet Nam

Peer Review on Energy Efficiency in Viet Nam Peer Review on Energy Efficiency in Viet Nam The 38 th APEC EWG Meeting 18~19 November, 2009 Bali, Indonesia Kenji Kobayashi President Asia Pacific Energy Research Centre Outline Part 1: Vietnam Peer Review

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

Risk-based security in practice Turning information into smart screening. October 2014

Risk-based security in practice Turning information into smart screening. October 2014 Risk-based security in practice Turning information into smart screening October 2014 Organizations charged with securing our society s vital functions transit, commerce, communication have expansive missions

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

NASA Policy Directive

NASA Policy Directive NASA Policy Directive NPD 8820.2D Effective Date: July 02, 2013 Expiration Date: July 02, 2018 COMPLIANCE IS MANDATORY Subject: Design and Construction of Facilities Responsible Office: Facilities Engineering

More information

Thailand Climate Change Adaptation Information

Thailand Climate Change Adaptation Information 6 th Asia Pacific Climate Change Adaptation Forum, 5 th Parallel Session: Information infrastructure on adaptation measures and technologies, 17-19 October 2018 in Manila, Philippines Thailand Climate

More information

Asian Disaster Preparedness Center

Asian Disaster Preparedness Center Asian Disaster Preparedness Center Presentation by Loy Rego At the ProVention Consortium Forum February 2007 Historical Overview Established in 1986, at the initiatives of 3 UN organizations: WMO, UNDP

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Corporate Governance and Internal Control

Corporate Governance and Internal Control 01 20 Lawson 93 Lawson strives to enhance Corporate Governance by improving the soundness and transparency of management, through ensuring compliance and affirmative disclosure. Overall view of Lawson

More information

Critical Infrastructure Resilience

Critical Infrastructure Resilience Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

Smartway Project. Hiroshi MAKINO. SS26, 12 th ITS World Congress in San Francisco. National Institute for Land and Infrastructure Management, Japan

Smartway Project. Hiroshi MAKINO. SS26, 12 th ITS World Congress in San Francisco. National Institute for Land and Infrastructure Management, Japan Smartway Project SS26, 12 th ITS World Congress in San Francisco National Institute for Land and Infrastructure Management, Japan Hiroshi MAKINO 0 1. Smartway Project 1) ITS Enter the Second Stage August

More information

Japan Tag Symposium 2017

Japan Tag Symposium 2017 Japan Tag Symposium 2017 The IoT Surrounding Area Possibilities and Examples of Digitalization in the International Community Heinz Dommel 22.5.2017 Düsseldorf Contents Hitachi Group Overall IoT projects

More information

change is built on a FOUNDATION OF STRENGTH

change is built on a FOUNDATION OF STRENGTH change is built on a FOUNDATION OF STRENGTH ALTERNATIVE ENERGIES HEALTHCARE IT CLEAN AIR AND WATER From supply chain safety and alternative energy resources to healthcare solutions and sustainability concerns,

More information

News Release October 17, 2018 New Energy and Industrial Technology Development Organization Hitachi, Ltd. Hitachi India Pvt. Ltd.

News Release October 17, 2018 New Energy and Industrial Technology Development Organization Hitachi, Ltd. Hitachi India Pvt. Ltd. News Release 2018.10.17 October 17, 2018 New Energy and Industrial Technology Development Organization Hitachi, Ltd. Hitachi India Pvt. Ltd. Demonstration Operation of ICT System to Improve Efficiency

More information

HITACHI Social Innovation & OSS

HITACHI Social Innovation & OSS HITACHI Social Innovation & OSS 2018/11/15 Ryo Kawai HITACHI LTD. Contents 1. Outline of Hitachi 2. Our Vision and OSS 1 Contents 1. Outline of Hitachi 2. Our Vision and OSS 2 Hitachi Corporate Profile

More information

Preparedness & BCP Resources: Strategies for Spreading BCP

Preparedness & BCP Resources: Strategies for Spreading BCP Preparedness & BCP Resources: Strategies for Spreading BCP Asia Pacific Economic Cooperation (APEC) Emergency Preparedness Working Group (EPWG) Workshop on Private Sector Emergency Preparedness Sendai,

More information

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015 ICT Policy Perspective for APEC Ministry of Internal Affairs and Communications March 2015 Current Status in APEC Region 1 GDP Growth Rate Twice the global average Share of Global Communications Service

More information

Guideline for Determining the TOE

Guideline for Determining the TOE Guideline for Determining the TOE in Certification Applications that Do Not Use PPs Version 2.0 This "Guideline for Determining the TOE" describes what kinds of matters to note when determining the scope

More information

U.S. Japan Internet Economy Industry Forum Joint Statement American Chamber of Commerce in Japan Keidanren. March 2014

U.S. Japan Internet Economy Industry Forum Joint Statement American Chamber of Commerce in Japan Keidanren. March 2014 U.S. Japan Internet Economy Industry Forum Joint Statement 2014 American Chamber of Commerce in Japan Keidanren March 2014 The joint-statement by the U.S. and Japanese business communities in October of

More information

(Ordinance of the Ministry of Posts and Telecommunications No. 64-November 16,

(Ordinance of the Ministry of Posts and Telecommunications No. 64-November 16, This English translation of the Civil Code has been prepared (up to the revisions of Act No. 80 of 2008 (These Rules shall come into effect as from the date of promulgation. (Some provisions shall come

More information

Presidential Documents

Presidential Documents Federal Register Vol. 84, No. 61 Friday, March 29, 2019 Presidential Documents 12041 Title 3 Executive Order 13865 of March 26, 2019 The President Coordinating National Resilience to Electromagnetic Pulses

More information

TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM JACIC Hiroyuki ISHIWATA

TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM JACIC Hiroyuki ISHIWATA TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM 2013.11.8 JACIC Hiroyuki ISHIWATA JACIC Electronic Bidding Core System Development Consortium introduce myself author name:

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Terms of Reference of the Advisory Board and Technical Advisory Group

Terms of Reference of the Advisory Board and Technical Advisory Group Terms of Reference of the Advisory Board and Technical Advisory Group Key Performance Indicators on Smart Sustainable Cities to assess the achievement of sustainable development goals Key Performance Indicators

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

National Open Source Strategy

National Open Source Strategy National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications

More information

Outline of AFIT Member Countries/Regions Data on Information Security. AFIT Secretariat February 19, 2009

Outline of AFIT Member Countries/Regions Data on Information Security. AFIT Secretariat February 19, 2009 Outline of AFIT Member Countries/Regions Data on Information Security AFIT Secretariat February 19, 2009 1 A. Basic IT Infrastructure Data Survey Sheet Contents (No. of PC/Internet User/IT human resources/fixed

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

Cyber Security Guidelines for Defining NIAP Scope Statements

Cyber Security Guidelines for Defining NIAP Scope Statements Cyber Security Guidelines for Defining NIAP Scope Statements Version 1.1 Author: Cyber Security Policy and Standards Document Published Date: June 2018 Document History: Version Description Date 1.0 Published

More information

UAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS June 2017 By: Space Policy and

UAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS June 2017 By: Space Policy and UAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS 2017 07-16 June 2017 By: Space Policy and Regulations Directory 1 The UAE will build the first city on

More information